⤷ Title: Why Your Security Stack Has 60 Muscles and No Nervous System
════════════════════════
𐀪 Author: Assaf
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 18:49:43 GMT
════════════════════════
⌗ Tags: #infosec #startup_lessons #cybersecurity #ai
════════════════════════
𐀪 Author: Assaf
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 18:49:43 GMT
════════════════════════
⌗ Tags: #infosec #startup_lessons #cybersecurity #ai
Medium
Why Your Security Stack Has 60 Muscles and No Nervous System
Every enterprise I’ve worked inside had 60+ security tools. Threat intel platforms. SIEMs. SOAR playbooks. EDR agents. Red team frameworks…
⤷ Title: KinoSec.ai Becomes the #1 Black-Box Autonomous Pentesting Platform in the World
════════════════════════
𐀪 Author: Alexis Lingad
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 20:51:14 GMT
════════════════════════
⌗ Tags: #penetration_testing #ai_security #black_box_testing #benchmark #autonomous_pentest
════════════════════════
𐀪 Author: Alexis Lingad
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 20:51:14 GMT
════════════════════════
⌗ Tags: #penetration_testing #ai_security #black_box_testing #benchmark #autonomous_pentest
Medium
KinoSec.ai Becomes the #1 Black-Box Autonomous Pentesting Platform in the World
92.3% Success Rate — Surpassing XBOW and Most Human Pentesters
⤷ Title: SSRF (Server-Side Request Forgery)
════════════════════════
𐀪 Author: Aditya Bhatt
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 20:29:02 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #ssrf #thm #cybersecurity
════════════════════════
𐀪 Author: Aditya Bhatt
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 20:29:02 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #ssrf #thm #cybersecurity
Medium
SSRF (Server-Side Request Forgery)
SSRF, Server-Side Request Forgery: Exploiting a vulnerable avatar fetching feature using directory traversal to force the server to access…
⤷ Title: TryHackMe : Pickle Rick Walkthrough
════════════════════════
𐀪 Author: Twilight
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 19:20:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme
════════════════════════
𐀪 Author: Twilight
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 19:20:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme
Medium
TryHackMe : Pickle Rick Walkthrough
If you’ve ever watched Rick and Morty, you probably remember the iconic episode where Rick turns himself into a pickle just to avoid family…
⤷ Title: My Journey Through MITM Attacks — Part 2: DHCP starvation & Rogue Server
════════════════════════
𐀪 Author: ofek789
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 20:52:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #programming #golang #networking #ethical_hacking
════════════════════════
𐀪 Author: ofek789
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 20:52:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #programming #golang #networking #ethical_hacking
Medium
My Journey Through MITM Attacks — Part 2: DHCP starvation & Rogue Server
Intro
⤷ Title: I Thought I Was a Hacker… Turns Out I Was Just Clicking Buttons
════════════════════════
𐀪 Author: Murari Pothuru
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 19:26:43 GMT
════════════════════════
⌗ Tags: #beginners_guide #self_improvement #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: Murari Pothuru
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 19:26:43 GMT
════════════════════════
⌗ Tags: #beginners_guide #self_improvement #ethical_hacking #cybersecurity
Medium
I Thought I Was a Hacker… Turns Out I Was Just Clicking Buttons 💀💻
Let me be honest.
⤷ Title: Islands of Invariance
════════════════════════
𐀪 Author: Rasta Mouse
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 22:06:31 GMT
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Rasta Mouse
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 22:06:31 GMT
════════════════════════
⌗ Tags: No_Tags
Rasta Mouse
Islands of Invariance
In my post Cracking the Crystal Palace, I explored several aspects of Crystal Palace that remain unchanged after +optimize and +mutate passes have been performed. These are "islands of invariance", or to put it another way, predicatable parts of Crystal Palace…
⤷ Title: Institutional DeFi: Building Secure Bridges Between Decentralized Protocols and Corporate Treasury
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 22:28:10 +0000
════════════════════════
⌗ Tags: #Blockchain #Fintech #Decentralization #DeFi #Smart Contract #Technology
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 22:28:10 +0000
════════════════════════
⌗ Tags: #Blockchain #Fintech #Decentralization #DeFi #Smart Contract #Technology
Hackread
Institutional DeFi: Building Secure Bridges Between Decentralized Protocols and Corporate Treasury
Follow us on all social media platforms @Hackread
⤷ Title: How to Avoid Confidentiality Gaps in Early-Stage Startups
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 21:55:45 +0000
════════════════════════
⌗ Tags: #Technology #Business #NDA #Startups
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 21:55:45 +0000
════════════════════════
⌗ Tags: #Technology #Business #NDA #Startups
Hackread
How to Avoid Confidentiality Gaps in Early-Stage Startups
Follow us on all social media platforms @Hackread
⤷ Title: Fake Zoom, Teams Meeting Invites Use Compromised Certificates to Drop Malware
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 21:27:17 +0000
════════════════════════
⌗ Tags: #Security #Malware #Microsoft #Adobe Reade #backdoor #Cyber Attack #Cybersecurity #Microsoft Teams #Phishing #Privacy #Vulnerability #Zoom
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 21:27:17 +0000
════════════════════════
⌗ Tags: #Security #Malware #Microsoft #Adobe Reade #backdoor #Cyber Attack #Cybersecurity #Microsoft Teams #Phishing #Privacy #Vulnerability #Zoom
Hackread
Fake Zoom, Teams Meeting Invites Use Compromised Certificates to Drop Malware
Follow us on all social media platforms @Hackread
⤷ Title: Why Did the PMKID Attack Surprise Researchers?
════════════════════════
𐀪 Author: Willian Bachini - MZTBTG
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 21:17:11 GMT
════════════════════════
⌗ Tags: #hacking #pmkid #wifi #hashcat #aircrack_ng
════════════════════════
𐀪 Author: Willian Bachini - MZTBTG
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 21:17:11 GMT
════════════════════════
⌗ Tags: #hacking #pmkid #wifi #hashcat #aircrack_ng
Medium
Why Did the PMKID Attack Surprise Researchers?
During a security analysis of WPA3, Jens ‘Atom’ Steube, administrator and lead developer of Hashcat, discovered the leakage of the PMKID…
⤷ Title: Try Hack Me- The Blob Blog CTF Walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 21:38:15 GMT
════════════════════════
⌗ Tags: #tryhackme #penetration_testing #cybersecurity #tryhackme_walkthrough #tryhackme_writeup
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 21:38:15 GMT
════════════════════════
⌗ Tags: #tryhackme #penetration_testing #cybersecurity #tryhackme_walkthrough #tryhackme_writeup
Medium
Try Hack Me- The Blob Blog CTF Walkthrough
Hello, stranger — let’s begin.
⤷ Title: Mayhem (THM) Tryhackme WriteUp Answer
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 22:17:29 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #wireshark #reverse_engineering #ctf_writeup
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 22:17:29 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #wireshark #reverse_engineering #ctf_writeup
Medium
Mayhem (THM) Tryhackme WriteUp Answer
Denoscription : Can you find the secrets inside the sea of mayhem?
⤷ Title: Speed Chatting-Unrestricted File Upload to Root RCE | TryHackMe Love at First Breach 2026
════════════════════════
𐀪 Author: m0ro23
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 21:50:04 GMT
════════════════════════
⌗ Tags: #rce #tryhackme_walkthrough #file_upload #tryhackme_writeup #tryhackme
════════════════════════
𐀪 Author: m0ro23
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 21:50:04 GMT
════════════════════════
⌗ Tags: #rce #tryhackme_walkthrough #file_upload #tryhackme_writeup #tryhackme
Medium
Speed Chatting-Unrestricted File Upload to Root RCE | TryHackMe Love at First Breach 2026
Introduction
⤷ Title: TryHackMe | NerdHerd | Walkthrough
════════════════════════
𐀪 Author: Sornphut
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 21:30:10 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme #linux #tryhackme_walkthrough #privilege_escalation
════════════════════════
𐀪 Author: Sornphut
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 21:30:10 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme #linux #tryhackme_walkthrough #privilege_escalation
Medium
TryHackMe | NerdHerd | Walkthrough
Initial Access
⤷ Title: OSCP Command(Educational & Defensive Analysis)
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 22:23:07 GMT
════════════════════════
⌗ Tags: #cybersecurity #oscp #cpt #ethical_hacking #information_security
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 22:23:07 GMT
════════════════════════
⌗ Tags: #cybersecurity #oscp #cpt #ethical_hacking #information_security
Medium
🔥 OSCP Command(Educational & Defensive Analysis)
By cyber_public_school | Cyber Security Researcher
⤷ Title: Facts Machine HTB Solution
════════════════════════
𐀪 Author: PsYc0
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 21:34:51 GMT
════════════════════════
⌗ Tags: #facts #hackthebox #ethical_hacking
════════════════════════
𐀪 Author: PsYc0
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 21:34:51 GMT
════════════════════════
⌗ Tags: #facts #hackthebox #ethical_hacking
Medium
Facts Machine HTB Solution
Firstly did a nmap scan and found some ports opened
⤷ Title: CVSS 10.0 Unauthenticated Remote Code Execution in FreeScout (Public Proof-of-Concept Disclosed)
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 00:50:37 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_2026_28289 #CVSS 10.0 #FreeScout #Help Desk Security #infosec #Patch Alert #Remote Code Execution #unauthenticated RCE #Vulnerability #Zero_Width Space
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 00:50:37 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_2026_28289 #CVSS 10.0 #FreeScout #Help Desk Security #infosec #Patch Alert #Remote Code Execution #unauthenticated RCE #Vulnerability #Zero_Width Space
Daily CyberSecurity
CVSS 10.0 Unauthenticated Remote Code Execution in FreeScout (Public Proof-of-Concept Disclosed)
A critical 10.0 CVSS unauthenticated remote code execution flaw (CVE-2026-28289) in FreeScout allows full server takeover via an invisible character exploit.
⤷ Title: BadPaw and MeowMeow: Russian Cyber Offensive Targets Ukraine with Novel Malware Duo
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 00:42:07 +0000
════════════════════════
⌗ Tags: #Cyber Security #Malware #APT28 #BadPaw #ClearSky #Fancy Bear #infosec #Malware Analysis #MeowMeow #Russian Cyber Attacks #steganography #threat intelligence #Ukraine Cyber War
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 00:42:07 +0000
════════════════════════
⌗ Tags: #Cyber Security #Malware #APT28 #BadPaw #ClearSky #Fancy Bear #infosec #Malware Analysis #MeowMeow #Russian Cyber Attacks #steganography #threat intelligence #Ukraine Cyber War
Daily CyberSecurity
BadPaw and MeowMeow: Russian Cyber Offensive Targets Ukraine with Novel Malware Duo
ClearSky uncovers a Russian campaign targeting Ukraine with BadPaw and MeowMeow malware, using steganography and feline decoys for stealthy espionage.
⤷ Title: Critical Infrastructure Alert: Unauthenticated Flaw in Labkotec Ice Detectors Could Freeze Operations
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 00:39:33 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Critical Infrastructure #CVE_2026_1775 #cybersecurity #ICS security #infosec #Labkotec #LID_3300IP #OT Security #Vulnerability #Wind Turbines
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 00:39:33 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Critical Infrastructure #CVE_2026_1775 #cybersecurity #ICS security #infosec #Labkotec #LID_3300IP #OT Security #Vulnerability #Wind Turbines
Daily CyberSecurity
Critical Infrastructure Alert: Unauthenticated Flaw in Labkotec Ice Detectors Could Freeze Operations
A critical 9.4 CVSS flaw (CVE-2026-1775) in Labkotec LID-3300IP ice detectors allows hackers to hijack wind turbines and airports. Hardware upgrade needed.
⤷ Title: Unmasking Silver Dragon: The Chinese-Nexus APT Haunting Southeast Asia and Europe
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 00:33:43 +0000
════════════════════════
⌗ Tags: #Cyber Security #Malware #Advanced Persistent Threat #APT41 #Check Point Research #cybersecurity #GearDoor #Google Drive C2 #infosec #Malware Analysis #Silver Dragon #threat intelligence
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 00:33:43 +0000
════════════════════════
⌗ Tags: #Cyber Security #Malware #Advanced Persistent Threat #APT41 #Check Point Research #cybersecurity #GearDoor #Google Drive C2 #infosec #Malware Analysis #Silver Dragon #threat intelligence
Daily CyberSecurity
Unmasking Silver Dragon: The Chinese-Nexus APT Haunting Southeast Asia and Europe
Check Point Research uncovers Silver Dragon, an APT41-linked group using the GearDoor backdoor and Google Drive for stealthy cyber espionage.